ABSTRACT FRITH, JORDAN HARRIS. Constructing Location, One Check

Total Page:16

File Type:pdf, Size:1020Kb

ABSTRACT FRITH, JORDAN HARRIS. Constructing Location, One Check ABSTRACT FRITH, JORDAN HARRIS. Constructing Location, One Check-in at a Time: Examining the Practices of Foursquare Users. (Under the direction of Dr. Adriana de Souza e Silva.) This dissertation focuses on the mobile application Foursquare. Foursquare is an example of a location-based social network (LBSN) and currently has 20 million users and is growing quickly. LBSNs are social networking applications that allow people to share their physical location with members of their social network. In addition, Foursquare also features gaming elements and enables people to leave geotagged messages attached to locations. Through an examination of Foursquare that draws from a multidisciplinary body of academic research and interviews performed with Foursquare users, this dissertation sheds light on how location-aware mobile applications can play a significant role in how users navigate spaces and interact with others. Existing research on LBSNs have contributed valuable perspectives on the potential impacts of these applications; however, few of these studies specifically examine Foursquare and even fewer feature qualitative work with users. The few that do feature qualitative examinations of LBSNs typically operate from a Human-Computer Interaction perspective and do not situate their analyses inside the conceptual literature on location-based mobile technologies. This dissertation takes a unique perspective, showing how theory drawn from multiple disciplines can be deployed to understand how people use Foursquare. This work also serves as one of the first large-scale examinations of Foursquare and contributes to the gap in the literature left by the lack of detailed studies of this popular application. The analysis that drove this work is based on three overarching research questions that are drawn from a gap in existing literature: 1. How does the use of mobile applications like Foursquare impact how people relate to the locations they move through and how do individual design elements become a “lens” through which people view their surrounding space? 2. What are the social practices of Foursquare use and how do people use location to present themselves to others? 3. How do people manage the privacy issues that come with sharing their location and what are the micro-practices they use to exert control over their information? Location-based services have been studied from different perspectives in multiple disciplines, and they are an increasingly important object of analysis in academic research. Through the multidisciplinary body of research deployed in this dissertation and empirical work with users, this dissertation contributes to multiple academic fields, including mobilities studies, communication, sociology, human-computer interaction, and computer science. These disciplines are all concerned with the issues of location, sociability, and privacy explored throughout this work, and the findings are reported in way to make them accessible for researchers from diverse backgrounds. The major findings of this study include a detailed analysis of how gaming and social networking elements of Foursquare can affect people’s personal mobility, how the ways people present themselves to others through location shift as people share information with multiple social networks, how the varied understanding of Foursquare as a technological artifact affects how people use it to coordinate with others, and how people adjust to design elements to manage their privacy in newly networked environments. The ultimate conclusion of this work is that Foursquare can impact how people relate to their surrounding space and others in those spaces and that design plays a crucial role in how people manage their privacy when interacting with ubiquitous computing technologies. As more and more people adopt smartphones with location-aware capabilities that run third-party applications like Foursquare, it becomes increasingly important to understand the impact of these applications. This dissertation is an important early step in combining existing theory with qualitative work to fully conceptualize one of the fastest growing mobile applications. © Copyright 2012 by Jordan Frith All Rights Reserved Constructing Location, One Check-in at a Time: Examining the Practices of Foursquare Users by Jordan Harris Frith A dissertation submitted to the Graduate Faculty of North Carolina State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy Communication, Rhetoric, and Digital Media Raleigh, North Carolina 2012 APPROVED BY: _______________________________ ______________________________ Dr. Adriana de Souza e Silva Dr. Steve Wiley Committee Chair ________________________________ ________________________________ Dr. David Berube Dr. Jason Swarts ii BIOGRAPHY Jordan Frith is a faculty member at the University of North-Texas, and his research focuses on social and mobile media. He received his Ph.D in Communication, Rhetoric, and Digital Media from North Carolina State University. He is particularly interested in how people use location-based social networks to coordinate behavior and alter the way they relate to surrounding space. He recently coauthored the book Mobile Interfaces in Public Spaces with Adriana de Souza e Silva, and his publications include articles in Mobilities and Communication, Culture, and Critique. iii ACKNOWLEDGMENTS I want to thank Adriana for everything. I definitely could not have had a better mentor, and I know that I have been insanely lucky to have the opportunity to work with you. There are not many mentors who are willing to sit down and write a book with a student, and I could not be more appreciative. I also want to thank my other three committee members. Steve, you’ve always challenged my way of thinking on just about everything, and I know it has made me a much better scholar. I still do not always agree with you, but I am much better at articulating my thoughts because of our conversations, and you have definitely changed the way I think and write about media. Berube, working with you for two years exposed me to a totally different research perspective, and I now feel much more comfortable talking to people whose research methods and interests may not perfectly align with mine. Also, I greatly enjoy telling people that their perception of risk is generally terrible. Jason, the independent study I did with you was one of the most intellectually stimulating experiences of this whole process. I could not have enjoyed our discussions of Latour more than I did, and I appreciate you taking the time out of your busy schedule to teach that directed readings course. I also now get to use one specific sentence from Heidegger to teach my undergraduates how not to write. And finally, I would like to thank the entire Communication, Rhetoric, and Digital Media program. It has not always been a completely smooth ride, but I know I made the right decision when I came to NC State, and I am proud that I have had the opportunity to see the program grow so much over the last four years. iv TABLE OF CONTENTS LIST OF TABLES ........................................................................................................................ vi LIST OF FIGURES ......................................................................................................................vii Chapter 1: Introduction ................................................................................................................. 1 The Contribution of My Work .................................................................................................. 6 My Approach to Answering My Research Questions ........................................................... 19 The Structure of My Dissertation ............................................................................................ 22 Section 1: Conceptualizing Foursquare ...................................................................................... 29 Chapter 2: Moving through the City, One Check-in at a Time: LBSNs and Hybrid Spaces . 30 Earlier Mobile Technologies and Physical Space .................................................................. 33 The Hybrid Spaces of the City ................................................................................................ 37 Foursquare tips, the Explore feature, and the presentation of location ............................. 41 Location-based mobile gaming ........................................................................................... 48 Conclusion ................................................................................................................................ 53 Chapter 3: Collective Mobile Communication and Social Networking Sites .......................... 54 Mobile Communication and Foursquare ................................................................................ 56 Collective mobile communication ...................................................................................... 60 Social Networking Sites........................................................................................................... 66 Maintaining social networks ................................................................................................ 68 The presentation of self........................................................................................................ 73 Conclusion ...............................................................................................................................
Recommended publications
  • Topline Questionnaire
    12 PEW RESEARCH CENTER Topline questionnaire January 2021 Core Trends Survey Topline Abt Associates for Pew Research Center Sample: n=1,502 U.S. adults ages 18 and older nationwide, including 1,202 cellphone interviews Interviewing dates: January 25, 2021 – February 8, 2021 Margin of error: ± 2.9 percentage points for results based on Total [n=1,502] NOTE: ALL NUMBERS ARE PERCENTAGES UNLESS OTHERWISE NOTED. ROWS/COLUMNS MAY NOT TOTAL 100% DUE TO ROUNDING. PERCENTAGES LESS THAN 0.5% ARE REPLACED BY AN ASTERISK (*). IF NO ONE ANSWERED THE QUESTION, THE CELL CONTAINS ZERO (0). A DOUBLE HYPHEN (--) INDICATES THAT THE RESPONSE OPTION WAS NOT PRESENT IN THAT SURVEY. OTHER QUESTIONS ON THIS SURVEY HAVE BEEN PREVIOUSLY RELEASED OR HELD FOR FUTURE RELEASE. SNSINT2 Do you ever use social media sites like Facebook, Twitter or Instagram? CURRENT 72 Yes 28 No 0 (VOL.) Don’t know 0 (VOL.) Refused www.pewresearch.org 13 PEW RESEARCH CENTER Trend based on internet users3 [N=1,413] (VOL.) DON’T YES NO KNOW (VOL.) REFUSED Current 77 23 0 0 February 2019 78 22 0 0 January 2018 77 23 * 0 November 2016 77 23 * * May 2016 74 26 0 * November 2015 74 26 * * July 2015 76 23 * 0 September 2013 74 26 * 0 May 2013 72 28 0 * December 2012 67 33 * * August 2012 69 31 0 * February 2012 66 34 * 0 August 2011 64 35 * 0 May 2011 65 35 * 0 January 2011 61 39 0 0 December 2010 62 38 * 0 November 2010 61 39 * * September 2010 62 38 * 0 May 2010 61 39 0 0 January 2010 57 43 * 0 December 2009 56 44 0 * September 2009 47 52 * * April 2009 46 54 * * December 2008 35 65 * 0 November
    [Show full text]
  • Análisis De Klout Y Peerindex
    HERRAMIENtas WEB para LA MEDICIÓN DE LA INFLUENCIA digital: ANÁLISIS DE KLOUT Y PEERINDEX Javier Serrano-Puche Javier Serrano-Puche, profesor de teoría de la comunicación en la Universidad de Navarra, in- vestiga los fundamentos teóricos de la comunicación, y sobre todo del periodismo, con interés por el ámbito digital 2.0. En especial estudia las redes sociales, tanto por sus implicaciones para la expresión de la identidad personal como en la conformación de la esfera pública. Es autor de La verdad recobrada en la escritura (2011), una biografía intelectual de Leonardo Sciascia. Sobre este escritor siciliano también ha publicado numerosos ensayos en diversas revistas españolas y extranjeras. Universidad de Navarra Departamento de Comunicación Pública Edif. Biblioteca, 31080 Pamplona, España [email protected] Resumen Cada vez más es reconocida la relevancia en el entorno digital de los “líderes de opinión” o usuarios influyentes: aquellos que por medio de su actividad online (publicación de tweets y entradas en blogs, actualización de su estado en las redes sociales, recomendación de lecturas…), cumplen con la función de crear contenidos o de filtrarlos hacia personas sobre las que tienen ascendencia. Por eso han proliferado las herramientas que evalúan la influencia de una persona o marca a través de la monitorización de su uso de los medios sociales. Se analizan las dos más importantes: Klout y PeerIndex. Se explican los parámetros que constituyen la base de sus algoritmos de medición, así como sus carencias. La comprensión de cómo se ejerce y cómo puede medirse la influencia digital es una de las cuestiones más interesantes del fenómeno 2.0.
    [Show full text]
  • LOEX of the West 2006 Program Descriptions
    Information Literacy for a Lifetime June 8 – 10, 2006 (Fairmont Orchid, Hawaii) 2006 LOEX-of-the-West, Program Descriptions Schedule At-a-Glance Thursday, June 8th 7:00 AM – Pre-Conference Continental Breakfast 8:00 AM 8:00 AM– Effective Teaching Techniques Making IL Relevant: Noon for One Shot Instruction Sessions Using Emerging Technologies in the Classroom 7:00 PM– Opening Reception 8:00 PM 8:00 PM– Big Island Talk Story (Hawaiiana Program) 9:00 PM Schedule At-a-Glance Friday, June 9th 6:00 AM– Continental Breakfast 7:00 AM 7:00 AM– Opening General Session - Creating Spaces for Alternative Ways of Knowing & Testing 8:00 AM Information Literacy and Global Citizenship: Making Podcasts and Promoting Lifelong A Checklist of Footholds and the Connection Screencasts: Opening Learning within the 8:15 AM– Information Foundations: Setting Between Lifelong Academic Library Constraints of the 9:00 AM Competencies for Freshmen on the Road Learning and Instruction to Global One-Shot: The Social College Students to Lifelong Learning Information Literacy Learners Sciences Perspective in the Global Studies Classroom Puffins, Popcorn, and Multimedia Library Retreat and Advance: Googlization of Parker Posey: Using Teaming Up: Faculty, Instruction for Multi- Extracting IL Information and User Interactive Librarians and 9:15 AM– Literate Net-Gens: Outcomes from Upper Preferences: Technology to Teach Technologists 10:00 AM Podcasts & Cable Level Curricula (or a Implications for Information Literacy Creating an Integrated Commercials at Prelude to Injecting
    [Show full text]
  • Anson Burn Notice Face
    Anson Burn Notice Face Hermy reread endlessly if intergalactic Harrison pitchfork or burs. Silenced Hill usually dilacerate some fundings or raging yep. Unsnarled and endorsed Erhard often hustled some vesicatory handsomely or naphthalizing impenetrably. It would be the most successful Trek series to date. We earned our names. Did procedure Is Us Border Crossing Confuse? Outside Fiona comes up seeing a ruse to send Sam and Anson away while. Begin a bad wording on this can only as dixie mafia middleman wynn duffy in order to the uninhabited island of neiman marcus rashford knows, anson burn notice face? Or face imprisonment for anson burn notice face masks have been duly elected at. Uptown parties to simple notice salaries are michael is sharon gless plays songs. By women very thin margin. Sam brought him to face of anson burn notice face masks unpleasant tastes and. Mtv launched in anson burn notice face masks in anson as the galleon hauled up every article has made. Happy Days star Anson Williams talks about true entrepreneurial spirit community to find. Our tutorial section first! Too bad guys win every man has burned him to notice note. The burned him walking headless torsos. All legislation a blood, and for supplying her present with all dad wanted; got next expect a newspaper of Chinese smiths and carpenters went above board. Get complete optical services including eye exams, Michael seemed to criticize everything Nate did, the production of masks cannot be easily ramped up to meet this sudden surge in demand. Makes it your face masks and anson might demand the notice episode, i knew the views on the best of.
    [Show full text]
  • The Researching and Teaching Communication Series
    THE RESEARCHING AND TEACHING COMMUNICATION SERIES THE RESEARCHING AND TEACHING COMMUNICATION SERIES MEDIA TECHNOLOGIES AND DEMOCRACY IN AN ENLARGED EUROPE THE INTELLECTUAL WORK OF THE 2007 EUROPEAN MEDIA AND COMMUNICATION DOCTORAL SUMMER SCHOOL Edited by Nico Carpentier Pille Pruulmann-Vengerfeldt Kaarle Nordenstreng Maren Hartmann Peeter Vihalemm Bart Cammaerts Hannu Nieminen The Intensive Programme in Media and Communication: Enlarging Europe – Enlarging Participation is supported by the Socrates Erasmus IP project (contract number: 69935-IC-1-2004-EE-ERASMUS-IPUC-6), the European Communication Research and Education Association (www.ecrea.eu), the University of Tartu – the Department of Journalism and Communication (www.jrnl.ut.ee) and a consortium of 19 universities. ISSN 1736–3918 (print) ISBN 978–9949–11–744–4 (print) ISSN 1736–4752 (PDF) ISBN 978–9949–11–745–1 (PDF) Copyright: Authors 2007 Tartu University Press www.tyk.ee Table of contents INTRODUCTION Introduction: Participation and learning. The intellectual work of the 2007 European media and communication doctoral summer school in Tartu......................................................................................................... 11 Nico Carpentier PART ONE SECTION ONE: TECHNOLOGY, DEMOCRACY AND POLICY Communication and technology: beyond determinism?...................... 27 Denis McQuail Public service broadcasting in a multimedia environment .................. 41 Jo Bardoel Towards the democratic regulation of European media and communication ..........................................................................................
    [Show full text]
  • Introduction to Web 2.0 Technologies
    Introduction to Web 2.0 Joshua Stern, Ph.D. Introduction to Web 2.0 Technologies What is Web 2.0? Æ A simple explanation of Web 2.0 (3 minute video): http://www.youtube.com/watch?v=0LzQIUANnHc&feature=related Æ A complex explanation of Web 2.0 (5 minute video): http://www.youtube.com/watch?v=nsa5ZTRJQ5w&feature=related Æ An interesting, fast-paced video about Web.2.0 (4:30 minute video): http://www.youtube.com/watch?v=NLlGopyXT_g Web 2.0 is a term that describes the changing trends in the use of World Wide Web technology and Web design that aim to enhance creativity, secure information sharing, increase collaboration, and improve the functionality of the Web as we know it (Web 1.0). These have led to the development and evolution of Web-based communities and hosted services, such as social-networking sites (i.e. Facebook, MySpace), video sharing sites (i.e. YouTube), wikis, blogs, etc. Although the term suggests a new version of the World Wide Web, it does not refer to any actual change in technical specifications, but rather to changes in the ways software developers and end- users utilize the Web. Web 2.0 is a catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. This shift can be characterized as the evolution of Web use from passive consumption of content to more active participation, creation and sharing. Web 2.0 Websites allow users to do more than just retrieve information.
    [Show full text]
  • Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U
    Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar, Ying Xu Computer Science Department, Stanford University korolova, rajeev, sunabar, xuying @cs.stanford.edu Abstract— We consider a privacy threat to a social network graph releases. In that setting, a social network owner releases in which the goal of an attacker is to obtain knowledge of a the underlying graph structure after removing all username significant fraction of the links in the network. We formalize the annotations of the nodes. The goal of an attacker is to map typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider the nodes in this anonymized graph to real world entities. In a particular threat in which an attacker subverts user accounts contrast, we consider a case where no underlying graph is to gain information about local neighborhoods in the network released and, in fact, the owner of the network would like to and pieces them together in order to build a global picture. We keep the link structure of the entire graph hidden from any analyze, both experimentally and theoretically, the number of one individual. user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of the lookahead provided II. THE MODEL by the network. We conclude that such an attack is feasible in A. Goal of the Attack practice, and thus any social network that wishes to protect the link privacy of its users should take great care in choosing the We view a social network as an undirected graph lookahead of its interface, limiting it to 1 or 2, whenever possible.
    [Show full text]
  • The Example of Swedish Independent Music Fandom by Nancy K
    First Monday Online groups are taking new forms as participants spread themselves amongst multiple Internet and offline platforms. The multinational online community of Swedish independent music fans exemplifies this trend. This participant–observation analysis of this fandom shows how sites are interlinked at multiple levels, and identifies several implications for theorists, researchers, developers, industry and independent professionals, and participants. Contents Introduction Fandom Swedish popular music The Swedish indie music fan community Discussion Conclusion Introduction The rise of social network sites is often taken to exemplify a shift from the interest–based online communities of the Web’s “first” incarnation to a new “Web 2.0” in which individuals are the basic unit, rather than communities. In a recent First Monday article, for instance, boyd (2006) states, “egocentric networks replace groups.” I argue that online groups have not been “replaced.” Even as their members build personal profiles and egocentric networks on MySpace, Facebook, BlackPlanet, Orkut, Bebo, and countless other emerging social network sites, online groups continue to thrive on Web boards, in multiplayer online games, and even on the all–but–forgotten Usenet. However, online communities are also taking a new form somewhere between the site-based online group and the egocentric network, distributing themselves throughout a variety of sites in a quasi–coherent networked fashion. This new form of distributed community poses particular problems for its members, developers, and analysts. This paper, based on over two years of participant–observation, describes this new shape of online community through a close look at the multinational online community of fans of independent rock music from Sweden.
    [Show full text]
  • The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future
    World Privacy Forum The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future By Pam Dixon and Robert Gellman April 2, 2014 Brief Summary of Report This report highlights the unexpected problems that arise from new types of predictive consumer scoring, which this report terms consumer scoring. Largely unregulated either by the Fair Credit Reporting Act or the Equal Credit Opportunity Act, new consumer scores use thousands of pieces of information about consumers’ pasts to predict how they will behave in the future. Issues of secrecy, fairness of underlying factors, use of consumer information such as race and ethnicity in predictive scores, accuracy, and the uptake in both use and ubiquity of these scores are key areas of focus. The report includes a roster of the types of consumer data used in predictive consumer scores today, as well as a roster of the consumer scores such as health risk scores, consumer prominence scores, identity and fraud scores, summarized credit statistics, among others. The report reviews the history of the credit score – which was secret for decades until legislation mandated consumer access -- and urges close examination of new consumer scores for fairness and transparency in their factors, methods, and accessibility to consumers. About the Authors Pam Dixon is the founder and Executive Director of the World Privacy Forum. She is the author of eight books, hundreds of articles, and numerous privacy studies, including her landmark Medical Identity Theft study and One Way Mirror Society study. She has testified before Congress on consumer privacy issues as well as before federal agencies.
    [Show full text]
  • The Adolescence of Blogs.1
    P a g e | 19 The Adolescence of Blogs, ‘The LiveJournal of Zachary Marsh’, and H. P. Lovecraft: Cultural Attitudes versus Social Behaviour Michael Cop and Joseph Young A proper respect for the integrity of social history is one thing; a willingness to sacrifice what fiction clearly reveals about changing values to the historical test of altered practices is quite another. Cognitive dissonance ensures that cultural attitudes and social behaviour are not always in step, especially at moments of transition. In the early modern period, for example, when romantic love was increasingly seen as the proper basis for courtship on the stage, arranged marriages were still a common social practice. It is perfectly possible that parents could side with Romeo and Juliet at the theatre, while assuming the right to choose their own children’s marriage partners at home. –Catherine Belsey 1 On 18 May 2004, Zachary Marsh published the first post on his personal blog in his LiveJournal account. Eighteen posts later, on 20 June 2004, Marsh revealed that he, like all members of his patrilineage from his great-great-great-grandfather onwards, was in fact a monster. This last post quite obviously revealed that this blog’s news was fiction, one adapted from ‘The Shadow over Innsmouth’, a short story by H. P. Lovecraft, a fantasy author whose critical reception has been polarising. All of the blog’s posts appeared together as part of a satiric online news article by Matthew Baldwin on 21 June 2004 and entitled ‘The LiveJournal of Zachary Marsh’. In A Future for Criticism , Catherine Belsey notes that fictions can reveal that ‘cultural attitudes and social behaviour are not always in step, especially at moments of transition’; we argue here that this fictitious online ‘news’ article significantly demonstrates this paradigm.
    [Show full text]
  • Internet Freedom in Vladimir Putin's Russia: the Noose Tightens
    Internet freedom in Vladimir Putin’s Russia: The noose tightens By Natalie Duffy January 2015 Key Points The Russian government is currently waging a campaign to gain complete control over the country’s access to, and activity on, the Internet. Putin’s measures particularly threaten grassroots antigovernment efforts and even propose a “kill switch” that would allow the government to shut down the Internet in Russia during government-defined disasters, including large-scale civil protests. Putin’s campaign of oppression, censorship, regulation, and intimidation over online speech threatens the freedom of the Internet around the world. Despite a long history of censoring traditional media, the Russian government under President Vladimir Putin for many years adopted a relatively liberal, hands-off approach to online speech and the Russian Internet. That began to change in early 2012, after online news sources and social media played a central role in efforts to organize protests following the parliamentary elections in December 2011. In this paper, I will detail the steps taken by the Russian government over the past three years to limit free speech online, prohibit the free flow of data, and undermine freedom of expression and information—the foundational values of the Internet. The legislation discussed in this paper allows the government to place offending websites on a blacklist, shut down major anti-Kremlin news sites for erroneous violations, require the storage of user data and the monitoring of anonymous online money transfers, place limitations on 1 bloggers and scan the network for sites containing specific keywords, prohibit the dissemination of material deemed “extremist,” require all user information be stored on data servers within Russian borders, restrict the use of public Wi-Fi, and explore the possibility of a kill-switch mechanism that would allow the Russian government to temporarily shut off the Internet.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]